Mining Logs to Model the Use of a System | IEEE Conference Publication | IEEE Xplore